Your Next Move: Chief Information Security Officer
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
CTOvision
OCTOBER 28, 2014
One of the many topics coved at the event was software defined perimeter and cloud security alliance. Related articles. On September 30 th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. Coca-Cola was used as a case study. Alan Boehme , the acting CISO at Coca-Cola. Watch the recorded presentation here. legalzoom.com).
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
CTOvision
APRIL 21, 2014
Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. By Bob Gourley.
Social, Agile and Transformation
JULY 3, 2023
Some context: I rarely blog about information security because it’s outside my core expertise in digital transformation. It’s hard to drive transformation and also have a risk and security mindset, and it’s extraordinarily time-consuming to keep up with the latest security threats.
CTOvision
MARCH 30, 2015
The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Related articles. Cyber Security and the Data Protection Act (acunetix.com). Reception is free. April 08, 2015.
Network World
DECEMBER 30, 2016
Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017.
Network World
APRIL 26, 2017
But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security. To read this article in full or to leave a comment, please click here
CTOvision
AUGUST 11, 2014
Major breaches in the last year at large companies like Target and eBay have made information security discussions more worrying and more widespread, albeit still not universally understood. A Tweet from Jeffrey Carr, a cybersecurity guru quoted by Mr. Yardon, echoed the articles title.
Galido
FEBRUARY 25, 2020
Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year. But they can be particularly disastrous to small businesses.
Network World
NOVEMBER 15, 2021
(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams. To read this article in full, please click here
CTOvision
OCTOBER 20, 2014
With Edward Snowden’s revelations, the myriad of recent information breaches at large corporations, and the extraordinary level of digitalization in our country, the American public has never placed a higher value on cyber security. CTOVision covered the story here. Good Luck with That.” The FBI is wrong about device encryption.
CTOvision
JUNE 20, 2014
The urgency of improving information security cannot be understated. Since the widely publicized attack on Target Corporation, data breaches have become increasingly common – sensitive information stored with both eBay and the California Department of Motor Vehicles has been compromised in the last six months alone.
CTOvision
AUGUST 21, 2014
Yep, the article points to an interview that Michael Daniel gave to GovInfoSecurity.com in which cites him: Michael Daniel sees his lack of technical expertise in IT security as an asset in his job as White House cybersecurity coordinator. Couldn’t be. I had to read on.
CTOvision
FEBRUARY 20, 2014
Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Bigman worked in every area of information and data security, the last fifteen years as the Agency’s Chief Information Security Officer (CISO).
Network World
FEBRUARY 15, 2017
The responsibilities of information security are rapidly changing as enterprises digitize. Digitization has spurred three company-wide shifts, creating the need for three associated new information security roles. Information security increasingly plays a larger role in advising business partners on strategy.
CTOvision
DECEMBER 5, 2014
Cloud Computing will morph from nebulous security hang-ups unto major business driver in helping government cut costs, eliminate redundancies, and connects disparate data centers. IaaS, SaaS & PaaS will go mainstream with Gov IT as data center consolidation will enable secure and reliable delivery of virtualized data solutions.
Network World
FEBRUARY 19, 2019
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. How edge computing can help secure the IoT.
Network World
DECEMBER 13, 2022
Hackers understand that backup servers are often under-protected and administered by junior personnel that are less well versed in information security. To read this article in full, please click here And it seems no one wants to do something about it lest they become the new backup expert responsible for the server.
Cloud Musings
FEBRUARY 4, 2015
Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO). Grab this Headline Animator ( Thank you.
CTOvision
JUNE 23, 2015
Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. Gourley led the discussion centered around the intense landscape of cyber threats, stressing the lack of security for Air Traffic Control (ATC) and avionics platforms.
Network World
APRIL 25, 2017
There are two times you might have to talk to your organization’s board of directors about security: before a breach and after. That should mean the board wants to talk with you, the CISO, to learn firsthand what your department is doing to mitigate information security threats.
Network World
MARCH 28, 2017
The information security threat landscape is constantly evolving. But that dependence makes them vulnerable to attacks on core internet infrastructure, devices used in daily business and key people with access to mission-critical information. To read this article in full or to leave a comment, please click here
Network World
APRIL 11, 2017
Career Tracker: What it takes to be a chief information security officer. Jeff Foltz did not set out to be an information security professional. To read this article in full or to leave a comment, please click here (Insider Story)
Cloud Musings
OCTOBER 25, 2013
What seems surprising, however, is that this shift is happening even in the face of repeated cautions and warnings about the security of public clouds. I''ve used this data to produce the Price/Performance vs Security chart below. If you enjoyed this article , get free updates by email or RSS - © Copyright Kevin L.
Network World
MARCH 1, 2016
Application security is arguably the biggest cyber threat , responsible for 90 percent of security incidents, according to the Department of Homeland Security. To read this article in full or to leave a comment, please click here (Insider Story)
Network World
MARCH 1, 2017
Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone.
Network World
FEBRUARY 19, 2019
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. How edge computing can help secure the IoT.
Network World
APRIL 19, 2021
“The [main treatment] plant was built [about] 15 years ago,” said Kristen Sanders, the authority’s chief information security officer. “So To read this article in full, please click here So if a piece of equipment went out, replacing it would be about shopping on eBay.”
Network World
MARCH 19, 2017
Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year. To read this article in full or to leave a comment, please click here
TechSpot
AUGUST 11, 2024
In 2007, security researchers Alexander Sotirov and Dino Dai Zovi founded the first annual Pwnie Awards, a ceremony centered on recognizing the year's best and worst achievements in information security. Read Entire Article
Network World
OCTOBER 20, 2023
Roughly 80% of CIOs reported that they plan to increase spending on cyber/information security in 2024, according to Gartner's 2024 CIO and Technology Executive Survey. To read this article in full, please click here Cybersecurity spending is also driving growth in the software segment.
Computerworld Vertical IT
MARCH 3, 2022
That means every business or personal computer user should audit their existing security protections, particularly for companies that have embraced the hybrid workplace. To read this article in full, please click here
Network World
MAY 23, 2017
With information security being a major concern at all companies, successful security executives need to be equally comfortable in the boardroom and the server room. These skills are consistently mentioned by CEOs and CSOs when we’re discussing how business and security leaders can work better together.
GeekWire
JUNE 13, 2024
House Committee on Homeland Security in a hearing titled, “A Cascade of Security Failures.” House Committee on Homeland Security for a hearing about the company’s security failures. House Committee on Homeland Security for a hearing about the company’s security failures.
Network World
AUGUST 4, 2016
To read this article in full or to leave a comment, please click here (Insider Story) High-flying salaries in some unexpected places Image by Greg Gjerdingen Before moving to this top city for InfoSec pay, you might want to read the latest John Sanford novel, brace for a bitter cold winter and develop a taste for tater tot hot dish.
Network World
DECEMBER 29, 2016
The high-water line in information security gets higher each year. To read this article in full or to leave a comment, please click here Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right back to trying to figure out what to do next.
SecureWorld News
APRIL 3, 2023
The concept of a Security Data Lake, a type of Data Lake explicitly designed for information security, has not received much attention yet. It can potentially bring a company's security to the next level. Security Data Lake encompasses more than just security logs and alerts.
Network World
JULY 1, 2016
With so many elements in information security -- application, network infrastructure, the endpoint, perimeter defenses, and data-centric approaches -- it's easy to fall in the trap of touting one as more important than the other. That overlap is most evident with application and endpoint security.
Data Center Knowledge
JULY 25, 2013
Customers are able to retain governance and control of corporate assets in the cloud, through proven security technologies and best practices. Featured Cloud Articles. Featured Modular Articles. ARCHIVED ARTICLES. Moving to cloud optimizes Total Cost of Ownership through the pay-as-you-go consumption model. Select Month.
Network World
MARCH 29, 2017
To read this article in full or to leave a comment, please click here Machine learning , the most prominent subset of AI, is about recognizing patterns in data and computer learning from them like a human. These algorithms draw inferences without being explicitly programmed to do so.
CTOvision
APRIL 13, 2015
Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world''s leading forums for enterprises and technical information security professionals. As the 2015 theme suggests, info security is an ever-changing industry. Related articles.
CTOvision
MARCH 24, 2016
The content for the article below is provided by Josh Ray, Vice President for Verisign iDefense. Josh Ray has experience with individuals in the security and cyber threat intelligence (CTI) mission space to create a variety of different capabilities in the public, private and commercial sectors. Read the full article here.
Network World
MAY 26, 2016
The two major international security agencies in Europe agree that building backdoors into encryption platforms is not the best way to secure systems because of the collateral damage it would do to privacy and the security of communications. To read this article in full or to leave a comment, please click here
Network World
MARCH 13, 2017
This article on W-2 scams sprung from a conversation I had with my colleague Steve Williams, who ended up being my co-author. Multiple times each year, LinkedIn feeds and information security forums light up with examples of the latest and greatest versions of phishing attacks. Check out more about him at the end of this piece.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content